Method and apparatus are disclosed for tracking hit and run perpetrators using V2X communication. An example host vehicle includes a first hardware module and a second hardware module. The first hardware module detects a collision with a target vehicle, and determines whether the collision is a hit-and-run event. The second hardware module collects identifying information of the target vehicle, and when the collision is the hit-and-run event, broadcasts a message including the identifying information and a cascade duration.
|
1. A host vehicle comprising:
a first hardware module to:
detect a collision with a target vehicle; and
determine whether the collision is a hit-and-run event; and
a second hardware module to:
collect identifying information of the target vehicle; and
when the collision is the hit-and-run event, broadcast to other vehicles within range a message including the identifying information and a cascade duration specifying a number of times the message is to be rebroadcast.
8. A method comprising:
detecting, at a first vehicle, a hit-and-run event involving the first vehicle and a target vehicle;
broadcasting, at the first vehicle, a message including identifying information of the target vehicle and a cascade duration;
in response to receiving the message, determining, at a second vehicle, whether the target vehicle is in a vicinity of the second vehicle;
when the target vehicle is in the vicinity of the second vehicle, collect, at the second vehicle, tracking information of the target vehicle.
2. The host vehicle of
in response to detecting the collision, set a timer to track an amount of time;
monitor a location of the target vehicle; and
when the target vehicle is a threshold distance away from the host vehicle before the amount of time reaches a threshold amount of time, determine that the collision is the hit-and-run event.
3. The host vehicle of
4. The host vehicle of
5. The host vehicle of
6. The host vehicle of
7. The host vehicle of
9. The method of
10. The method of
in response to detecting the collision, setting a timer;
monitoring a location of the target vehicle; and
when the target vehicle is a threshold distance away from the first vehicle before a threshold amount of time, determining that the collision is the hit-and-run event.
11. The method of
determining whether the cascade duration is greater than a threshold; and
when the cascade duration is greater than the threshold, decrementing the cascade duration, and broadcasting the message.
12. The method of
increasing the cascade duration;
appending the tracking information and a location of the second vehicle to the message; and
broadcasting the message.
13. The method of
14. The method of
|
The present disclosure generally relates to vehicle-to-everything (V2X) communication and, more specifically, tracking hit and run perpetrators using V2X communication.
The Dedicated Short Range Communication (DSRC) protocol is being developed as a part of the Intelligent Transportation System. The DSRC protocol will enable different forms of communications, such as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-pedestrian (V2P) (collectively “V2X”). The aim of deploying the DSRC protocol is to reduce fatalities, injuries, property destruction, time lost in traffic, fuel consumption, exhaust gas exposure, among others. Increasingly, vehicles are being equipped to use the DSRC protocol.
“Hit and run” events occur when one driver strikes another vehicle, and drives away from the scene. These events are common, especially in urban areas where vehicles are often parked on the street. Hit and run events cause problems for the victims, the police, and insurance. The perpetrators of these offenses often go unpunished, as victims are unable to get the driver's identification before they speed away.
The appended claims define this application. The present disclosure summarizes aspects of the embodiments and should not be used to limit the claims. Other implementations are contemplated in accordance with the techniques described herein, as will be apparent to one having ordinary skill in the art upon examination of the following drawings and detailed description, and these implementations are intended to be within the scope of this application.
Example embodiments are disclosed for tracking hit and run perpetrators using V2X communication. An example host vehicle includes a first hardware module and a second hardware module. The first hardware module detects a collision with a target vehicle, and determines whether the collision is a hit-and-run event. The second hardware module collects identifying information of the target vehicle, and when the collision is the hit-and-run event, broadcasts a message including the identifying information and a cascade duration.
An example method includes detecting, at a first vehicle, a hit-and-run event involving the first vehicle and a target vehicle. The example method also includes broadcasting, at the first vehicle, a message including identifying information of the target vehicle and a cascade duration. The example method includes, in response to receiving the message, determining, at a second vehicle, whether the target vehicle is in the vicinity of the second vehicle. Additionally, the example method includes, when the target vehicle is in the vicinity of the second vehicle, collect, at the second vehicle, tracking information of the target vehicle.
For a better understanding of the invention, reference may be made to embodiments shown in the following drawings. The components in the drawings are not necessarily to scale and related elements may be omitted, or in some instances proportions may have been exaggerated, so as to emphasize and clearly illustrate the novel features described herein. In addition, system components can be variously arranged, as known in the art. Further, in the drawings, like reference numerals designate corresponding parts throughout the several views.
While the invention may be embodied in various forms, there are shown in the drawings, and will hereinafter be described, some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated.
A host vehicle equipped with a V2X communication module detects when a target vehicle (sometimes referred to as the “perpetrator”) collides with the host vehicle and drives away (sometimes referred to as a “hit and run event”). In some examples, the V2X communication module is implemented using the Dedicated Short Range Communication (DSRC) protocol. When the host vehicle detects the hit and run event, the broadcasts a tracking message that includes identifying information (e.g., license plate, vehicle identification number, VIN, make and model, color, etc.) of the target vehicle. The tracking messages starts a cascade of tracking information as recipients detect the target vehicle, add tracking information, and rebroadcast the tracking message. The tracking message also includes a cascade duration. The cascade duration specifies a number of times the target message is to be rebroadcast.
Upon the reception of the tracking message, other vehicles (sometimes referred to as “bystander vehicles”) and/or roadside units (e.g., V2X-enabled charging stations, V2X-enabled cameras, V2X-enabled traffic signals, etc.) (a) determine whether the target vehicle is in the vicinity, (b) when the target vehicle is within the vicinity, capture information (e.g., images, a license plate number, location, speed, trajectory, etc.) about the target vehicle, and (c) rebroadcast the targeting message. The bystander vehicles and/or the roadside units append the captured information and/or coordinates to the target message. The captured information includes V2X messages transmitted by the target vehicle (e.g., safety messages, etc.), images captured by cameras, and/or measurements by sensors (e.g., RADAR, LiDAR, ultrasonic sensors, etc.), etc. In such a manner, as the target message cascades, the target vehicle is be tracked. The tracking messages are collected by authorities (e.g., police, etc.). The tracking information in the tracking messages is compiled and analyzed to identify the target vehicle.
The body control module 102 controls various subsystems of the host vehicle 100. For example, the body control module 102 may control power windows, power locks, an immobilizer system, and/or power mirrors, etc. The body control module 102 includes processors and/or circuits to, for example, drive relays (e.g., to control wiper fluid, etc.), drive brushed direct current (DC) motors (e.g., to control power seats, power locks, power windows, wipers, etc.), drive stepper motors, and/or drive LEDs, etc. In the illustrated example, the body control module 102 includes a collision sensor 110 and a hit-and-run (HR) detector 112. The collision sensor 110 detects when the host vehicle 100 is impacted by a force indicative of a collision (e.g., a combination of sudden lateral, front and/or rear forces) with another vehicle (e.g., a target vehicle 114). In some examples, the collision sensor 110 includes an accelerometer. Alternatively or additionally, in some examples, the collision sensor 110 analyzes data from the cameras 104 and/or the sensors 106 to determine when the target vehicle 114 collides with the host vehicle 100. For example, the collision sensor 110 may use image recognition and/or LiDAR/RADAR measurements to determine when the body of the target vehicle 114 collides with the body of the host vehicle 100.
The HR detector 112 classifies whether the collision is a hit-and-run event after a collision is detected. When a collision is detected, the HR detector 112 collects information about the target vehicle 114 from the cameras 104, the sensors 106, and/or the V2X module 108. For example, the cameras 104 may capture images to identify the vehicle (e.g., via image recognition to detect make, model, and color, license plate recognition to capture the license plate, etc.), the sensors 106 may determine the trajectory of the target vehicle 114, and the V2X module 108 may collect information broadcast by a V2X module of the target vehicle 114 (e.g., via a safety message, etc.). Additionally, the HR detector 112 starts a timer. The timer is used to determine if any of the target vehicle 114 begins to drive away from the scene before a minimum time (e.g., five minutes, ten minutes, etc.) has expired. When a collision is detected and the target vehicle 114 drives away before a threshold period of time, the HR detector 112 classifies the collision as a hit-and-run event. More examples of the operation of the HR detector 112 are described in U.S. application Ser. No. 15/598,378 entitled “Hit-and-Run Detection,” filed May 18, 2017, which is herein incorporated by reference in its entirety.
The camera 104 captures images, in response to a hit-and-run event, to be analyzed to determine identifying information of the target vehicle 114. In some examples, the camera 104 includes an image processor that performs (a) image recognition to determine the make, model, and/or color of the target vehicle 114 in conjunction with on on-board or remote database and/or (b) license plate recognition. The camera(s) 104 is/are a forward-facing camera, a rear-facing camera, and/or a 360-degree-view camera, etc.
The sensors 106 may be arranged in and around the host vehicle 100 in any suitable fashion. The sensors 106 may mounted to measure properties around the exterior of the host vehicle 100. Additionally, some sensors 106 may be mounted inside the cabin of the host vehicle 100 or in the body of the host vehicle 100 (such as, the engine compartment, the wheel wells, etc.) to measure properties in the interior of the host vehicle 100. For example, such sensors 106 may include accelerometers, odometers, tachometers, pitch and yaw sensors, wheel speed sensors, microphones, tire pressure sensors, and biometric sensors, etc. In the illustrated example, the sensors 106 include range detection sensors. The range detection sensors are sensors that detect and measure objects (such as the target vehicle 114) in the vicinity of the host vehicle 100. The sensors 106 may include, for example, RADAR, LiDAR, ultrasonic sensors, and/or infrared sensors, etc.
The example V2X module 108 include antenna(s), radio(s) and software to broadcast messages and to establish connections between the vehicles 100 and 114, infrastructure-based modules (not shown), and mobile device-based modules (not shown). In some examples, the V2X module 108 is implemented with the Dedicated Short Range Communication (DSRC) protocol. More information on the DSRC network and how the network may communicate with vehicle hardware and software is available in the U.S. Department of Transportation's Core June 2011 System Requirements Specification (SyRS) report (available at http://www its.dot.gov/meetings/pdf/CoreSystem_SE_SyRS_RevA%20(2011-06-13).pdf), which is hereby incorporated by reference in its entirety along with all of the documents referenced on pages 11 to 14 of the SyRS report. DSRC systems may be installed on vehicles and along roadsides on infrastructure. DSRC systems incorporating infrastructure information is known as a “roadside” system. DSRC may be combined with other technologies, such as Global Position System (GPS), Visual Light Communications (VLC), Cellular Communications, and short range radar, facilitating the vehicles communicating their position, speed, heading, relative position to other objects and to exchange information with other vehicles or external computer systems. DSRC systems can be integrated with other systems such as mobile phones.
Currently, the DSRC network is identified under the DSRC abbreviation or name. However, other names are sometimes used, usually related to a Connected Vehicle program or the like. Most of these systems are either pure DSRC or a variation of the IEEE 802.11 wireless standard. However, besides the pure DSRC system it is also meant to cover dedicated wireless communication systems between cars and roadside infrastructure system, which are integrated with GPS and are based on an IEEE 802.11 protocol for wireless local area networks (such as, 802.11p, etc.).
In some examples, when a collision is detected, the V2X module 108 broadcasts a collision message that includes identifying information (e.g., a vehicle identification number (VIN), a license plate number, etc.) and a location (e.g., coordinates from a global positioning system (GPS) receiver) of the vehicle (such as the host vehicle 100 and/or the target vehicle 114).
In the illustrated example, the V2X module 108 includes a target tracker 116. The target tracker 116 sends a target message when the HR detector 112 detects a hit-and-run event. The tracker message includes (a) identifying information of the host vehicle 100, (b) identifying information about the target vehicle 114 and (c) a cascade duration. The identifying information is captured by the cameras 104, the sensors 106, and/or the V2X module 108 (e.g., via collision messages and/or safety messages broadcast by the target vehicle 114). For example, the target message may include the license plate of the target vehicle 114. The cascade duration is set so that the message propagates to bystander vehicles (e.g., the bystander vehicles 200 of
When a bystander vehicle or roadside unit receives the target message (e.g., via its own V2X module 108 that includes the target tracker 116), the bystander vehicle or roadside unit determines whether the target vehicle 114 is within its vicinity. In some examples, the bystander vehicle or roadside unit detects broadcasts (e.g., safety messages) from the V2X module of the target vehicle 114. Alternatively or additionally, the bystander vehicle or roadside unit detects (e.g., via one or more cameras) the target vehicle 114 using the identifying information (e.g., license plate number, make, model, color, etc.) included in the target message. When the target vehicle is not detected and when the cascade duration is greater than zero, the bystander vehicle or roadside unit (i) decrements the cascade duration and (ii) broadcasts the target message. When the target vehicle 114 is detected, the bystander vehicle or roadside unit captures identifying information of the target vehicle 114. The captured information includes images, safety message data, and/or trajectory data (e.g., measured by sensors of the bystander vehicle or roadside unit.), etc. For example, the bystander vehicle or roadside unit may capture an image of the target vehicle 114 and determine the speed and direction (e.g., the trajectory) of the target vehicle 114 using its LiDAR. Additionally, the bystander vehicle or roadside unit determines its coordinates where the target vehicle 114 is spotted. The bystander vehicle or roadside unit then (i) appends the identifying information and the coordinates of the bystander vehicle or roadside unit to the target message, (ii) sets the cascade duration to its original value, and (iii) broadcasts the target message. In such a manner, the target message continues to cascade in the vicinity of the target vehicle 114. Additional examples of causing V2X messages to propagate (e.g., cascade) through V2X-enabled vehicles and road side units are described in International Application No. PCT/US2016/062893, entitled “Method and Apparatus to Enable Vehicle-to-Vehicle Guidance and Tracking,” filed Nov. 18, 2016, which is herein incorporated by reference in its entirety.
The body control module 102 a processor or controller 304 and memory 306. In the illustrated example, the body control module 102 is structured to include HR detector 112. The processor or controller 304 may be any suitable processing device or set of processing devices such as, but not limited to: a microprocessor, a microcontroller-based platform, a suitable integrated circuit, one or more field programmable gate arrays (FPGAs), and/or one or more application-specific integrated circuits (ASICs). The memory YYY may be volatile memory (e.g., RAM, which can include non-volatile RAM, magnetic RAM, ferroelectric RAM, and any other suitable forms); non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc). In some examples, the memory YYY includes multiple kinds of memory, particularly volatile memory and non-volatile memory.
The memory 306 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure can be embedded. The instructions may embody one or more of the methods or logic as described herein. In a particular embodiment, the instructions may reside completely, or at least partially, within any one or more of the memory 306, the computer readable medium, and/or within the processor 304 during execution of the instructions.
The V2X module 108 includes transmission/reception circuitry 308, a processor or controller 310 and memory 312. In the illustrated example, the V2X module 108 is structured to include the target tracker 116. The processor or controller 310 may be any suitable processing device or set of processing devices such as, but not limited to: a microprocessor, a microcontroller-based platform, a suitable integrated circuit, one or more FPGAs, and/or one or more ASICs. The memory 312 may be volatile memory (e.g., RAM, which can include non-volatile RAM, magnetic RAM, ferroelectric RAM, and any other suitable forms); non-volatile memory (e.g., disk memory, FLASH memory, EPROMs, EEPROMs, memristor-based non-volatile solid-state memory, etc.), unalterable memory (e.g., EPROMs), read-only memory, and/or high-capacity storage devices (e.g., hard drives, solid state drives, etc). In some examples, the memory 312 includes multiple kinds of memory, particularly volatile memory and non-volatile memory.
The memory 312 is computer readable media on which one or more sets of instructions, such as the software for operating the methods of the present disclosure can be embedded. The instructions may embody one or more of the methods or logic as described herein. In a particular embodiment, the instructions may reside completely, or at least partially, within any one or more of the memory 312, the computer readable medium, and/or within the processor 310 during execution of the instructions.
The terms “non-transitory computer-readable medium” and “tangible computer-readable medium” should be understood to include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The terms “non-transitory computer-readable medium” and “tangible computer-readable medium” also include any tangible medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor or that cause a system to perform any one or more of the methods or operations disclosed herein. As used herein, the term “tangible computer readable medium” is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals.
The vehicle data bus 302 communicatively couples the body control module 102, the camera(s) 106, the sensors 106, and the V2X module 108. In some examples, the vehicle data bus 302 includes one or more data buses. The vehicle data bus 302 may be implemented in accordance with a controller area network (CAN) bus protocol as defined by International Standards Organization (ISO) 11898-1, a Media Oriented Systems Transport (MOST) bus protocol, a CAN flexible data (CAN-FD) bus protocol (ISO 11898-7) and/a K-line bus protocol (ISO 9141 and ISO 14230-1), and/or an Ethernet™ bus protocol IEEE 802.3 (2002 onwards), etc.
When the collision is a hit-and-run event, the target tracker 116 of the host vehicle 100 collects identifying information about the target vehicle 114. (block 410). The identifying information may include, for example, make and model, color, license plate number, VIN, and/or V2X identifier, etc. The target tracker 116 then broadcasts the target message with the identifying information of the target vehicle 114 and a cascade duration (block 410). When the collision is not a hit-and-run event, the target tracker 116 of the host vehicle 100 collects identifying information about the target vehicle 114. (block 412).
When the target vehicle 114 is detected, the target tracker 116 determines the location of the bystander vehicle 200 or the road side unit 202 (block 508). The target tracker 116 collects tracking data about the target vehicle 114. (block 510). The tracking data may include, for example, one or more images, license plate number, and/or trajectory of the target vehicle 114, etc. The target tracker appends the location of the bystander vehicle 200 or the road side unit 202 and the tracking data to the target message (block 512). The target tracker 116 increases the cascade duration (block 514). In some examples, the target tracker 116 resets the cascade duration to its original values. For example, if the host vehicle original sets the cascade duration to three, the target tracker 116 of the bystander vehicle 200 or the road side unit 202 may reset the cascade duration to three. The target tracker 116 then broadcasts the appended target message (block 516).
When the target vehicle 114 is not detected, the target tracker 116 decrements the cascade duration of the target message (block 518). The target tracker 116 determines whether to broadcast the target message (block 520). The target tracker 116 determines to broadcast the tracker message when the cascade duration is greater than zero. When the tracker message is to be broadcast, the method continues to block 522. Otherwise, when the tracker message is not to be broadcast, the method ends. When the tracker message is to be broadcast, the target tracker 116 sets the cascade duration of the tracker message to the value calculated at block 518 and broadcasts the tracker message.
The flowcharts of
In this application, the use of the disjunctive is intended to include the conjunctive. The use of definite or indefinite articles is not intended to indicate cardinality. In particular, a reference to “the” object or “a” and “an” object is intended to denote also one of a possible plurality of such objects. Further, the conjunction “or” may be used to convey features that are simultaneously present instead of mutually exclusive alternatives. In other words, the conjunction “or” should be understood to include “and/or”. The terms “includes,” “including,” and “include” are inclusive and have the same scope as “comprises,” “comprising,” and “comprise” respectively.
The above-described embodiments, and particularly any “preferred” embodiments, are possible examples of implementations and merely set forth for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiment(s) without substantially departing from the spirit and principles of the techniques described herein. All modifications are intended to be included herein within the scope of this disclosure and protected by the following claims.
Makled, Daniel A., McQuillen, Michael
Patent | Priority | Assignee | Title |
10735924, | Oct 02 2018 | Cisco Technology, Inc. | Re-broadcasting a message by a road side unit |
10970902, | Mar 26 2019 | AT&T Intellectual Property I, L.P.; AT&T MOBILITY II LLC | Allocating and extrapolating data for augmented reality for 6G or other next generation network |
11076262, | May 03 2019 | Malikie Innovations Limited | Method and system for vehicle location tracking using V2X communication |
11282252, | Mar 26 2019 | AT&T MOBILITY II LLC; AT&T Intellectual Property I, L.P. | Allocating and extrapolating data for augmented reality |
11443632, | Aug 28 2019 | Hyundai Motor Company; Kia Motors Corporation | Vehicle and control method thereof |
11551181, | Dec 20 2018 | BlackBerry Limited; BLACKBERRY UK LIMITED | Method and system for internet of things asset tracking within an intelligent transportation system |
11632654, | May 03 2019 | Malikie Innovations Limited | Method and system for vehicle location tracking using V2X communication |
11868949, | Dec 20 2018 | BlackBerry Limited | Method and system for internet of things asset tracking within an intelligent transportation system |
11941716, | Dec 15 2020 | LEONARDO US CYBER AND SECURITY SOLUTIONS, LLC | Systems and methods for electronic signature tracking |
ER3042, |
Patent | Priority | Assignee | Title |
6246323, | Mar 18 1998 | SC Holdings, LLC | Method and system for tracking a vehicle |
7069118, | Sep 30 2003 | International Business Machines Corporation | Apparatus, system, and method for exchanging vehicle identification data |
9102261, | May 10 2012 | Vehicular collision-activated information exchange method and apparatus using wireless communication radios | |
9508201, | Jan 09 2015 | KYNDRYL, INC | Identifying the origins of a vehicular impact and the selective exchange of data pertaining to the impact |
20010006373, | |||
20060033615, | |||
20090024274, | |||
20090299857, | |||
20120242511, | |||
20120286974, | |||
20140132404, | |||
20140218529, | |||
20140375807, | |||
20150019447, | |||
20150112504, | |||
20150112543, | |||
20150244994, | |||
20150310742, | |||
20170178513, | |||
CN104091441, | |||
JP2013023100, | |||
KR100763322, | |||
WO2008093925, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 23 2017 | MAKLED, DANIEL A | Ford Global Technologies, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043209 | /0934 | |
May 23 2017 | MCQUILLEN, MICHAEL | Ford Global Technologies, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043209 | /0934 | |
May 25 2017 | Ford Global Technologies, LLC | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Mar 09 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Oct 02 2021 | 4 years fee payment window open |
Apr 02 2022 | 6 months grace period start (w surcharge) |
Oct 02 2022 | patent expiry (for year 4) |
Oct 02 2024 | 2 years to revive unintentionally abandoned end. (for year 4) |
Oct 02 2025 | 8 years fee payment window open |
Apr 02 2026 | 6 months grace period start (w surcharge) |
Oct 02 2026 | patent expiry (for year 8) |
Oct 02 2028 | 2 years to revive unintentionally abandoned end. (for year 8) |
Oct 02 2029 | 12 years fee payment window open |
Apr 02 2030 | 6 months grace period start (w surcharge) |
Oct 02 2030 | patent expiry (for year 12) |
Oct 02 2032 | 2 years to revive unintentionally abandoned end. (for year 12) |